Heap-Based Buffer Overflow in NetSupport Manager by NetSupport
CVE-2025-34164

9.3CRITICAL

Key Information:

Vendor
CVE Published:
29 August 2025

What is CVE-2025-34164?

CVE-2025-34164 is a heap-based buffer overflow vulnerability identified in NetSupport Manager, a remote control and management tool developed by NetSupport Ltd. This software is widely used for providing support and managing computer systems remotely. The vulnerability affects versions of NetSupport Manager 14.x prior to 14.12.0000, allowing a remote, unauthenticated attacker to exploit the flaw. Such exploitation can lead to significant negative consequences for organizations, including denial of service (DoS) or the execution of arbitrary code. The ability for unauthorized actors to manipulate the software in this manner poses substantial risks, as it compromises the confidentiality, integrity, and availability of managed systems.

Potential impact of CVE-2025-34164

  1. Denial of Service (DoS): Exploiting this vulnerability can result in service interruptions, rendering affected systems unreachable and disrupting business operations that rely on remote management and support functionalities.

  2. Arbitrary Code Execution: Attackers can execute malicious code on the compromised systems, gaining unauthorized access and control. This can lead to further exploitation, data leakage, and potential establishment of persistent threats within the network.

  3. Erosion of Trust and Compliance Risks: The ability for attackers to exploit such vulnerabilities raises concerns over data security and regulatory compliance. Organizations may face legal and reputational repercussions if sensitive information is compromised due to this oversight.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

NetSupport Manager 14.x < 14.12.0000

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Fabian Weber of CODE WHITE
.